计算机程序的摄动分析

L. Morell, B. Murrill, Renata Rand
{"title":"计算机程序的摄动分析","authors":"L. Morell, B. Murrill, Renata Rand","doi":"10.1109/CMPASS.1997.613242","DOIUrl":null,"url":null,"abstract":"Error flow analysis is the study of how errors originate, spread, and propagate during program execution based on the three steps of the fault/failure model: execution, infection, and propagation. These three steps are defined relative to a virtual computer-by judiciously selecting the instruction set and data state of this computer the need for infection analysis can be reduced or eliminated in favor of execution and propagation analysis. A key aspect of propagation analysis is injecting errors into the data state and tracing their expect. Perturbation analysis injects errors by directly modifying the data state of on executing program. The resulting code that is executed-the tail code-is analyzed for its error-flow behavior. Perturbation analysis is a language-independent and efficient method of characterizing the propagation rate of each tail function, the function computed by all tail code originating at a given location. This paper defines a model for perturbation analysis, and uses the model to explain the performance of analysis techniques (e.g. statement, data flow, and mutation analysis).","PeriodicalId":377266,"journal":{"name":"Proceedings of COMPASS '97: 12th Annual Conference on Computer Assurance","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1997-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":"{\"title\":\"Perturbation analysis of computer programs\",\"authors\":\"L. Morell, B. Murrill, Renata Rand\",\"doi\":\"10.1109/CMPASS.1997.613242\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Error flow analysis is the study of how errors originate, spread, and propagate during program execution based on the three steps of the fault/failure model: execution, infection, and propagation. These three steps are defined relative to a virtual computer-by judiciously selecting the instruction set and data state of this computer the need for infection analysis can be reduced or eliminated in favor of execution and propagation analysis. A key aspect of propagation analysis is injecting errors into the data state and tracing their expect. Perturbation analysis injects errors by directly modifying the data state of on executing program. The resulting code that is executed-the tail code-is analyzed for its error-flow behavior. Perturbation analysis is a language-independent and efficient method of characterizing the propagation rate of each tail function, the function computed by all tail code originating at a given location. This paper defines a model for perturbation analysis, and uses the model to explain the performance of analysis techniques (e.g. statement, data flow, and mutation analysis).\",\"PeriodicalId\":377266,\"journal\":{\"name\":\"Proceedings of COMPASS '97: 12th Annual Conference on Computer Assurance\",\"volume\":\"8 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1997-06-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"13\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of COMPASS '97: 12th Annual Conference on Computer Assurance\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CMPASS.1997.613242\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of COMPASS '97: 12th Annual Conference on Computer Assurance","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CMPASS.1997.613242","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 13

摘要

错误流分析是基于故障/故障模型的三个步骤:执行、感染和传播,研究错误在程序执行期间如何产生、传播和传播。这三个步骤是定义相对于虚拟的计算机明智地选择这台计算机的指令集和数据状态可以减少或消除感染的必要性分析的执行和传播分析。传播分析的一个关键方面是将错误注入数据状态并跟踪它们的预期。摄动分析通过直接修改一个正在执行的程序的数据状态来注入错误。分析执行的结果代码(尾部代码)的错误流行为。微扰分析是一种独立于语言的有效方法,用于表征每个尾函数的传播速率,该函数由所有尾代码在给定位置产生计算。本文定义了一个微扰分析模型,并用该模型来解释分析技术(如语句、数据流和突变分析)的性能。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Perturbation analysis of computer programs
Error flow analysis is the study of how errors originate, spread, and propagate during program execution based on the three steps of the fault/failure model: execution, infection, and propagation. These three steps are defined relative to a virtual computer-by judiciously selecting the instruction set and data state of this computer the need for infection analysis can be reduced or eliminated in favor of execution and propagation analysis. A key aspect of propagation analysis is injecting errors into the data state and tracing their expect. Perturbation analysis injects errors by directly modifying the data state of on executing program. The resulting code that is executed-the tail code-is analyzed for its error-flow behavior. Perturbation analysis is a language-independent and efficient method of characterizing the propagation rate of each tail function, the function computed by all tail code originating at a given location. This paper defines a model for perturbation analysis, and uses the model to explain the performance of analysis techniques (e.g. statement, data flow, and mutation analysis).
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Software testing: from theory to practice Tools for formal specification, verification, and validation of requirements Using the B-toolkit to ensure safety in SCR specifications Evolving directions in formal methods Testing for security during development: why we should scrap penetrate-and-patch
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1